[Pkg-shadow-devel] The way UIDs and GIDs are created
mrbm74 at gmail.com
Sat Sep 24 10:58:35 UTC 2016
Also there's now the concept of subuids and subgids which can leave a quite
> small set of usable uids and which, moreover, would become unusable after
> the first few random uids, as the subuids need to (each) be a consecutive
Didn't know about this conecpt. And honestly I do not understand the purpose of
this concept. But as I understand this concept is optional and must be
configured manually to be activated.
The concept of hash values for UIDs and GIDs should also be optional. It only
makes sense in unmanaged networks.
The implementation I would suggest is as follows:
- Activating hash values is done either via a parameter or via an entry in a
config file in /etc.
- The entry in the config file is initially set by the installer. In the
installer the user can choose if he wants to activate this. So that the first
user created in the newly installed system already has hash values for UIDs and
- UIDs and GIDs used for new users and new groups can always be overridden by a
More information about the Pkg-shadow-devel